CN112738077A - Industrial control network safety detection system - Google Patents
Industrial control network safety detection system Download PDFInfo
- Publication number
- CN112738077A CN112738077A CN202011570146.1A CN202011570146A CN112738077A CN 112738077 A CN112738077 A CN 112738077A CN 202011570146 A CN202011570146 A CN 202011570146A CN 112738077 A CN112738077 A CN 112738077A
- Authority
- CN
- China
- Prior art keywords
- production equipment
- module
- network
- behavior
- honeypot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A safety detection system of an industrial control network comprises a management information network and an industrial production network, wherein a safety buffer area is arranged between the management information network and the industrial production network, and a first firewall and an intrusion detection module are arranged in the safety buffer area; the first firewall and the intrusion detection module are used for blocking the intrusion of the external network user to the system; the industrial production network is provided with a honeypot, a second firewall, a production equipment identification module, a production equipment behavior monitoring module, a production equipment behavior analysis module and an abnormal shutdown module; an intrusion detection unit, a behavior recording unit and an alarm unit are arranged in the honeypot; a production equipment searching unit, a production equipment identifying unit and a production equipment information recording unit are arranged in the production equipment identifying module; in the invention, the network security detection effect is improved by two layers of network security detection protection; moreover, the honeypot can quickly discover invasion behaviors, and the detection effect is strong; meanwhile, abnormal behaviors can be found quickly, and the machine can be stopped in time to avoid serious loss.
Description
Technical Field
The invention relates to the technical field of network security, in particular to an industrial control network security detection system.
Background
Industrial control networks have been developed on the basis of field bus technology, which are constructed with measurement control devices as network nodes, which have digital communication capabilities and can be distributed in large numbers on the production site. Industrial networks are highly open and require high communication protocols. The operation of the system is mainly to realize free information communication between on-site devices, so that the tasks of the control system can be completed more easily and the completion speed is higher. The traditional industrial control network security detection system is provided with a firewall and an intrusion detection system in front of an industrial production network, the internal network is public in the way, all security depends on the security guarantee measures of an operating system, and in the actual operation process, a situation that a third-party storage object such as a U disk bypasses the boundary protection and brings viruses into an internal network exists, so that the security protection reliability is greatly reduced, and the traditional security detection system has serious hysteresis in intrusion detection, so that a manager can effectively counter attack after an intruder finishes more attacks, and a great deal of loss is caused; meanwhile, the existing intrusion attack means are more and more secret and more difficult to detect, irrecoverable loss is often detected during intrusion, and even an administrator cannot detect the intrusion after the intrusion of an attacker is finished.
The invention provides an industrial control network safety detection system and a detection method with a Chinese patent publication number of CN106487813A, wherein a test case module provides a test case for a fuzzy test engine; the fuzzy test engine generates a test data packet and carries out security detection on a detection target to obtain test results including 'normal', 'other' and 'suspected bugs'; the monitor monitors the state of the detection target in real time; the root cause analysis module drives the fuzzy test engine to carry out attack replay, and after the vulnerability verification is successful, the abnormal data packet is subjected to abnormal analysis to obtain a root cause of the security vulnerability; the report generation engine generates a test report. The industrial control network security detection system is used for carrying out security detection, detection is deep and comprehensive, unknown security vulnerabilities can be effectively found, and the root causes of the security vulnerabilities are obtained. However, due to the characteristics of the industrial control network, various vulnerabilities occur irregularly and aperiodically, and even if the vulnerabilities are detected, the industrial control network cannot be protected safely, so that an intruder can still use the vulnerabilities to attack.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an industrial control network security detection system, which constructs a first layer of network security detection protection through a first firewall and an intrusion detection module, constructs a second layer of network security detection protection through a honeypot, and improves the network security detection effect; the honeypot is not accessed under normal conditions, so all attempts to link the honeypot are regarded as suspicious operation, the response sensitivity of the honeypot to common network scanning and intrusion is greatly improved, the intrusion behavior can be found quickly, and the detection effect is strong; meanwhile, the actual operation behavior of the equipment is compared with the theoretical operation behavior in real time, so that the abnormal behavior can be quickly found and the equipment can be shut down in time, and even if the intrusion behavior is very secret, the serious loss can not be caused.
(II) technical scheme
The invention provides an industrial control network security detection system, which comprises a management information network and an industrial production network, wherein a security buffer area is arranged between the management information network and the industrial production network, and a first firewall and an intrusion detection module are arranged in the security buffer area; the first firewall and the intrusion detection module are used for blocking the intrusion of the external network user to the system;
the industrial production network is provided with a honeypot, a second firewall, a production equipment identification module, a production equipment behavior monitoring module, a production equipment behavior analysis module and an abnormal shutdown module;
the honeypot is internally provided with an intrusion detection unit, a behavior recording unit and an alarm unit, wherein the intrusion detection unit is used for identifying scanning behaviors carried out on the honeypot, the behavior recording unit is used for recording behaviors of an intruder in the honeypot, and the alarm unit is used for notifying a network administrator; honeypots are not visited under normal network traffic, and all attempts to link them are considered suspicious;
the second firewall is used for blocking the invasion of the external network users to the industrial production network;
a production equipment searching unit, a production equipment identifying unit and a production equipment information recording unit are arranged in the production equipment identifying module; the production equipment searching unit is used for searching all node equipment in the industrial production network, the production equipment identifying unit is used for identifying specific production equipment, the identified information comprises equipment type, manufacturer model, equipment function and equipment theoretical operation behavior, and the production equipment information recording unit is used for recording the equipment information identified by the production equipment identifying unit; the production equipment identification module establishes a theoretical operation behavior library corresponding to the equipment;
the production equipment behavior monitoring module is used for monitoring and recording all actual operation behaviors of the production equipment;
the production equipment behavior analysis module is used for comparing the actual operation behavior with the theoretical operation behavior library, judging the actual operation behavior as abnormal behavior when the actual operation behavior is not in the theoretical operation behavior library, and simultaneously informing a manager;
the abnormal shutdown module is connected with the production equipment behavior analysis module and used for stopping the operation of the production equipment, and when a certain production equipment generates two times of abnormal behaviors of the same kind or different kinds, the abnormal shutdown module is started to emergently shut down the corresponding production equipment.
Preferably, an upper limit value of the outgoing flow of the honeypot is set, and when the outgoing quantity of the honeypot reaches the preset upper limit value, the second firewall blocks all information packets sent out by the subsequent honeypot.
Preferably, the number of leaks in the honey pots is greater than the number of leaks in a normal industrial production network.
Preferably, the industrial control network security detection method is provided, and comprises the following steps: s1, identifying the equipment type by the production equipment identification module, and establishing a theoretical operation behavior library; s2, detecting and blocking the external network intrusion behavior by the first firewall and intrusion detection module; s3, detecting the scanning behavior of the honeypot on the industrial production network, and judging suspicious operation; s4, screening suspicious operation of the honeypots, confirming intrusion behavior, and sending alarm information to an administrator; s5, the production equipment identification module accelerates the working frequency, and when identifying that a certain production equipment generates two times of abnormal behaviors of the same kind or different kinds, the abnormal shutdown module starts to emergently shut down the corresponding production equipment; and S6, after the flow rate of the honey pot reaches the set upper limit, the second firewall blocks all the information packets sent out by the following honey pot.
Preferably, the honeypots are arranged in multiple groups.
Preferably, a storage unit is arranged in the abnormal shutdown module, records the shutdown condition of the historical equipment, and performs descending order according to the shutdown time.
Preferably, the production equipment identification module numbers each equipment, and the theoretical operation behavior library matches the corresponding relationship with the equipment with the corresponding number.
Preferably, the first firewall comprises a link data filtering module, an attack detection module, a deep protocol filtering module and a log auditing module; the link data filtering module can filter three layers of protocols, namely IP, TCP, UDP and ICMP, and filter two layers of protocols, namely ARP, 802.1q and the like; the attack detection module can detect ICMP Flood, Ping of Deat, UDP Flood, Land, Tear Drop and SYN attacks; the depth protocol filtering module supports the depth analysis of OPC, Modbus, IEC 60870-5-104, IEC 61850MMS, IEC 61850GOOSE, DNP3, EnIP, CIP, Profinet, Siemens S7 and OMRON FIN protocols; the log auditing module can interact with the remote management terminal to upload log information in real time.
The technical scheme of the invention has the following beneficial technical effects: a first layer of network security detection protection is constructed through a first firewall and an intrusion detection module, and a second layer of network security detection protection is constructed through a honeypot, so that the network security detection effect is improved; the honeypot is not accessed under normal conditions, so all attempts to link the honeypot are regarded as suspicious operation, the response sensitivity of the honeypot to common network scanning and intrusion is greatly improved, the intrusion behavior can be found quickly, and the detection effect is strong; meanwhile, the actual operation behavior of the equipment is compared with the theoretical operation behavior in real time, so that the abnormal behavior can be quickly found and the equipment can be shut down in time, and even if the intrusion behavior is very secret, the serious loss can not be caused.
Drawings
Fig. 1 is a structural diagram of an industrial control network security detection system according to the present invention.
Fig. 2 is a structural diagram of a first firewall in the industrial control network security detection system according to the present invention.
Fig. 3 is a flowchart of the industrial control network security detection method provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-3, the industrial control network security detection system provided by the present invention includes a management information network and an industrial production network, wherein a security buffer area is disposed between the management information network and the industrial production network, and a first firewall and an intrusion detection module are disposed in the security buffer area; the first firewall and the intrusion detection module are used for blocking the intrusion of the external network user to the system;
the industrial production network is provided with a honeypot, a second firewall, a production equipment identification module, a production equipment behavior monitoring module, a production equipment behavior analysis module and an abnormal shutdown module;
the honeypot is internally provided with an intrusion detection unit, a behavior recording unit and an alarm unit, wherein the intrusion detection unit is used for identifying scanning behaviors carried out on the honeypot, the behavior recording unit is used for recording behaviors of an intruder in the honeypot, and the alarm unit is used for notifying a network administrator; honeypots are not visited under normal network traffic, and all attempts to link them are considered suspicious;
the second firewall is used for blocking the invasion of the external network users to the industrial production network;
a production equipment searching unit, a production equipment identifying unit and a production equipment information recording unit are arranged in the production equipment identifying module; the production equipment searching unit is used for searching all node equipment in the industrial production network, the production equipment identifying unit is used for identifying specific production equipment, the identified information comprises equipment type, manufacturer model, equipment function and equipment theoretical operation behavior, and the production equipment information recording unit is used for recording the equipment information identified by the production equipment identifying unit; the production equipment identification module establishes a theoretical operation behavior library corresponding to the equipment;
the production equipment behavior monitoring module is used for monitoring and recording all actual operation behaviors of the production equipment;
the production equipment behavior analysis module is used for comparing the actual operation behavior with the theoretical operation behavior library, judging the actual operation behavior as abnormal behavior when the actual operation behavior is not in the theoretical operation behavior library, and simultaneously informing a manager;
the abnormal shutdown module is connected with the production equipment behavior analysis module and used for stopping the operation of the production equipment, and when a certain production equipment generates two times of abnormal behaviors of the same kind or different kinds, the abnormal shutdown module is started to emergently shut down the corresponding production equipment.
In the invention, a first firewall and an intrusion detection module detect and block external network intrusion behaviors, when an intruder breaks through the first firewall and the intrusion detection module and enters an industrial production network, a honeypot detects all scanning behaviors, when the honeypot is scanned, suspicious operation is judged, the honeypot discriminates the suspicious operation through the subsequent trend capable of operating, the intrusion behavior is confirmed, alarm information is sent to an administrator, the administrator can take measures in time to counter attack, meanwhile, a production equipment identification module accelerates the working frequency, and when a certain production equipment is identified to generate two abnormal behaviors of the same kind or different kinds, an abnormal shutdown module is started to emergently shut down the corresponding production equipment to prevent serious loss. According to the invention, a first layer of network security detection protection is constructed through a first firewall and an intrusion detection module, and a second layer of network security detection protection is constructed through a honeypot, so that the network security detection effect is improved; the honeypot is not accessed under normal conditions, so all attempts to link the honeypot are regarded as suspicious operation, the response sensitivity of the honeypot to common network scanning and intrusion is greatly improved, the intrusion behavior can be found quickly, and the detection effect is strong; meanwhile, the actual operation behavior of the equipment is compared with the theoretical operation behavior in real time, so that the abnormal behavior can be quickly found and the equipment can be shut down in time, and even if the intrusion behavior is very secret, the serious loss can not be caused.
In an optional embodiment, an upper limit value of the outgoing flow of the honeypots is set, and when the outgoing amount of the honeypots reaches the preset upper limit, the second firewall blocks all information packets sent out by the subsequent honeypots; the attackers are prevented from invading and cracking the honeypots in a short time and using the honeypots as springboards to continue invading other equipment.
In an optional embodiment, the number of the loopholes in the honeypots is more than that in a normal industrial production network; the method is easier to attract attention of attackers, so that time is spent on attacking the honeypot server, and a network administrator can find the attackers to invade in time and take measures in time, so that targets which are probably attacked at first are protected, and really valuable contents are not attacked.
In an optional embodiment, an industrial control network security detection method is provided, including the following steps:
s1, identifying the equipment type by the production equipment identification module, and establishing a theoretical operation behavior library;
s2, detecting and blocking the external network intrusion behavior by the first firewall and intrusion detection module;
s3, detecting the scanning behavior of the honeypot on the industrial production network, and judging suspicious operation;
s4, screening suspicious operation of the honeypots, confirming intrusion behavior, and sending alarm information to an administrator;
s5, the production equipment identification module accelerates the working frequency, and when identifying that a certain production equipment generates two times of abnormal behaviors of the same kind or different kinds, the abnormal shutdown module starts to emergently shut down the corresponding production equipment;
s6, after the flow rate of the honey pot outside reaches the set upper limit, the second firewall blocks all the information packets sent out by the following honey pot; the honeypot can discover scanning or other abnormal invasion behaviors at the first time, so that the management personnel can quickly react, and meanwhile, the honeypot can play a role of trapping, so that a great deal of energy of attackers can be consumed, and the speed of the attackers invading the industrial production network is delayed, thereby playing a role in protecting network security.
In an alternative embodiment, the honeypots are arranged in multiple groups; the attacker is easy to crack the honeypot first, and other devices are protected.
In an optional embodiment, a storage unit is arranged in the abnormal shutdown module, records the shutdown conditions of the historical equipment, and performs descending arrangement according to the shutdown time; the shutdown record can be conveniently checked subsequently.
In an optional embodiment, the production equipment identification module numbers each equipment, and the theoretical operation behavior library matches with the equipment with the corresponding number; when actual operation behaviors are compared, the corresponding equipment is quickly locked through the serial numbers, and the comparison efficiency is improved.
In an optional embodiment, the first firewall comprises a link data filtering module, an attack detection module, a depth protocol filtering module and a log auditing module; the link data filtering module can filter three layers of protocols, namely IP, TCP, UDP and ICMP, and filter two layers of protocols, namely ARP, 802.1q and the like; the attack detection module can detect ICMP Flood, Ping of Deat, UDP Flood, Land, Tear Drop and SYN attacks; the depth protocol filtering module supports the depth analysis of OPC, Modbus, IEC 60870-5-104, IEC 61850MMS, IEC 61850GOOSE, DNP3, EnIP, CIP, Profinet, Siemens S7 and OMRON FIN protocols; the log auditing module can interact with the remote management terminal to upload log information in real time; the system can carry out deep analysis on various protocols on the market and analyze generated logs, thereby being convenient for discovering intrusion behaviors.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.
Claims (8)
1. The industrial control network safety detection system is characterized by comprising a management information network and an industrial production network, wherein a safety buffer area is arranged between the management information network and the industrial production network, and a first firewall and an intrusion detection module are arranged in the safety buffer area; the first firewall and the intrusion detection module are used for blocking the intrusion of the external network user to the system;
the industrial production network is provided with a honeypot, a second firewall, a production equipment identification module, a production equipment behavior monitoring module, a production equipment behavior analysis module and an abnormal shutdown module;
the honeypot is internally provided with an intrusion detection unit, a behavior recording unit and an alarm unit, wherein the intrusion detection unit is used for identifying scanning behaviors carried out on the honeypot, the behavior recording unit is used for recording behaviors of an intruder in the honeypot, and the alarm unit is used for notifying a network administrator; honeypots are not visited under normal network traffic, and all attempts to link them are considered suspicious;
the second firewall is used for blocking the invasion of the external network users to the industrial production network;
a production equipment searching unit, a production equipment identifying unit and a production equipment information recording unit are arranged in the production equipment identifying module; the production equipment searching unit is used for searching all node equipment in the industrial production network, the production equipment identifying unit is used for identifying specific production equipment, the identified information comprises equipment type, manufacturer model, equipment function and equipment theoretical operation behavior, and the production equipment information recording unit is used for recording the equipment information identified by the production equipment identifying unit; the production equipment identification module establishes a theoretical operation behavior library corresponding to the equipment;
the production equipment behavior monitoring module is used for monitoring and recording all actual operation behaviors of the production equipment;
the production equipment behavior analysis module is used for comparing the actual operation behavior with the theoretical operation behavior library, judging the actual operation behavior as abnormal behavior when the actual operation behavior is not in the theoretical operation behavior library, and simultaneously informing a manager;
the abnormal shutdown module is connected with the production equipment behavior analysis module and used for stopping the operation of the production equipment, and when a certain production equipment generates two times of abnormal behaviors of the same kind or different kinds, the abnormal shutdown module is started to emergently shut down the corresponding production equipment.
2. The industrial control network security detection system of claim 1, wherein an upper limit value of the outgoing flow of the honeypot is set, and when the outgoing amount of the honeypot reaches the preset upper limit, the second firewall blocks all packets sent out by the subsequent honeypot.
3. The industrial network security detection system of claim 1, wherein the number of vulnerabilities within the honeypot is greater than the number of vulnerabilities in a normal industrial production network.
4. The industrial control network security detection system according to any one of claims 1 to 3, which provides an industrial control network security detection method, comprising the following steps:
s1, identifying the equipment type by the production equipment identification module, and establishing a theoretical operation behavior library;
s2, detecting and blocking the external network intrusion behavior by the first firewall and intrusion detection module;
s3, detecting the scanning behavior of the honeypot on the industrial production network, and judging suspicious operation;
s4, screening suspicious operation of the honeypots, confirming intrusion behavior, and sending alarm information to an administrator;
s5, the production equipment identification module accelerates the working frequency, and when identifying that a certain production equipment generates two times of abnormal behaviors of the same kind or different kinds, the abnormal shutdown module starts to emergently shut down the corresponding production equipment;
and S6, after the flow rate of the honey pot reaches the set upper limit, the second firewall blocks all the information packets sent out by the following honey pot.
5. The industrial control network security detection system of claim 1, wherein a plurality of sets of honeypots are provided.
6. The industrial control network safety detection system according to claim 1, wherein a storage unit is arranged in the abnormal shutdown module, and the storage unit records the shutdown conditions of the historical equipment and performs descending order according to the shutdown time.
7. The industrial control network security detection system of claim 1, wherein the production device identification module numbers each device, and the theoretical operation behavior library matches the corresponding relationship with the device with the corresponding number.
8. The industrial control network security detection system of claim 1, wherein the first firewall comprises a link data filtering module, an attack detection module, a deep protocol filtering module, and a log auditing module; the link data filtering module can filter three layers of protocols, namely IP, TCP, UDP and ICMP, and filter two layers of protocols, namely ARP, 802.1q and the like; the attack detection module can detect ICMP Flood, Ping of Deat, UDP Flood, Land, Tear Drop and SYN attacks; the depth protocol filtering module supports the depth analysis of OPC, Modbus, IEC 60870-5-104, IEC 61850MMS, IEC 61850GOOSE, DNP3, EnIP, CIP, Profinet, Siemens S7 and OMRON FIN protocols; the log auditing module can interact with the remote management terminal to upload log information in real time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011570146.1A CN112738077A (en) | 2020-12-26 | 2020-12-26 | Industrial control network safety detection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011570146.1A CN112738077A (en) | 2020-12-26 | 2020-12-26 | Industrial control network safety detection system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112738077A true CN112738077A (en) | 2021-04-30 |
Family
ID=75616737
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011570146.1A Pending CN112738077A (en) | 2020-12-26 | 2020-12-26 | Industrial control network safety detection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112738077A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114039766A (en) * | 2021-11-05 | 2022-02-11 | 杭州和利时自动化有限公司 | Industrial safety protection method, system and device |
CN115348109A (en) * | 2022-09-28 | 2022-11-15 | 北京珞安科技有限责任公司 | Industrial production threat early warning method, system, electronic device and storage medium |
CN115618353A (en) * | 2022-10-21 | 2023-01-17 | 北京珞安科技有限责任公司 | Identification system and method for industrial production safety |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790778A (en) * | 2012-08-22 | 2012-11-21 | 常州大学 | DDos (distributed denial of service) attack defensive system based on network trap |
CN103139184A (en) * | 2011-12-02 | 2013-06-05 | 中国电信股份有限公司 | Intelligent network firewall device and network attack protection method |
CN106961442A (en) * | 2017-04-20 | 2017-07-18 | 中国电子技术标准化研究院 | A kind of network method for entrapping based on honey jar |
CN107426242A (en) * | 2017-08-25 | 2017-12-01 | 中国科学院计算机网络信息中心 | Network safety protection method, device and storage medium |
CN110495138A (en) * | 2017-05-31 | 2019-11-22 | 西门子股份公司 | The monitoring method of industrial control system and its network security |
US20200137112A1 (en) * | 2018-10-30 | 2020-04-30 | Charter Communications Operating, Llc | Detection and mitigation solution using honeypots |
CN112054996A (en) * | 2020-08-05 | 2020-12-08 | 杭州木链物联网科技有限公司 | Attack data acquisition method and device for honeypot system |
-
2020
- 2020-12-26 CN CN202011570146.1A patent/CN112738077A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139184A (en) * | 2011-12-02 | 2013-06-05 | 中国电信股份有限公司 | Intelligent network firewall device and network attack protection method |
CN102790778A (en) * | 2012-08-22 | 2012-11-21 | 常州大学 | DDos (distributed denial of service) attack defensive system based on network trap |
CN106961442A (en) * | 2017-04-20 | 2017-07-18 | 中国电子技术标准化研究院 | A kind of network method for entrapping based on honey jar |
CN110495138A (en) * | 2017-05-31 | 2019-11-22 | 西门子股份公司 | The monitoring method of industrial control system and its network security |
CN107426242A (en) * | 2017-08-25 | 2017-12-01 | 中国科学院计算机网络信息中心 | Network safety protection method, device and storage medium |
US20200137112A1 (en) * | 2018-10-30 | 2020-04-30 | Charter Communications Operating, Llc | Detection and mitigation solution using honeypots |
CN112054996A (en) * | 2020-08-05 | 2020-12-08 | 杭州木链物联网科技有限公司 | Attack data acquisition method and device for honeypot system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114039766A (en) * | 2021-11-05 | 2022-02-11 | 杭州和利时自动化有限公司 | Industrial safety protection method, system and device |
CN115348109A (en) * | 2022-09-28 | 2022-11-15 | 北京珞安科技有限责任公司 | Industrial production threat early warning method, system, electronic device and storage medium |
CN115348109B (en) * | 2022-09-28 | 2023-02-03 | 北京珞安科技有限责任公司 | Industrial production threat early warning method and system, electronic equipment and storage medium |
CN115618353A (en) * | 2022-10-21 | 2023-01-17 | 北京珞安科技有限责任公司 | Identification system and method for industrial production safety |
CN115618353B (en) * | 2022-10-21 | 2024-01-23 | 北京珞安科技有限责任公司 | Industrial production safety identification system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7603709B2 (en) | Method and apparatus for predicting and preventing attacks in communications networks | |
CN112738077A (en) | Industrial control network safety detection system | |
US7624447B1 (en) | Using threshold lists for worm detection | |
JP4501280B2 (en) | Method and apparatus for providing network and computer system security | |
Ganame et al. | A global security architecture for intrusion detection on computer networks | |
US20030188189A1 (en) | Multi-level and multi-platform intrusion detection and response system | |
US20100251370A1 (en) | Network intrusion detection system | |
EP1595193B1 (en) | Detecting and protecting against worm traffic on a network | |
CN116827675A (en) | Network information security analysis system | |
Singh et al. | Testbed-based evaluation of siem tool for cyber kill chain model in power grid scada system | |
CN110636086A (en) | Network protection test method and device | |
CN113783880A (en) | Network security detection system and network security detection method thereof | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
CN114006722B (en) | Situation awareness verification method, device and system for detecting threat | |
Zhang et al. | Unveiling malicious activities in lan with honeypot | |
RU2703329C1 (en) | Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them | |
CN111885020A (en) | Network attack behavior real-time capturing and monitoring system with distributed architecture | |
Kato et al. | A real-time intrusion detection system (IDS) for large scale networks and its evaluations | |
CN111683063B (en) | Message processing method, system, device, storage medium and processor | |
Wu et al. | Study of intrusion detection systems (IDSs) in network security | |
Pao et al. | Netflow based intrusion detection system | |
Fuzi et al. | Integrated network monitoring using zabbix with push notification via telegram | |
CN215912109U (en) | Industrial control network architecture for real-time detection of network data traffic and attack | |
CN115314252B (en) | Protection method, system, terminal and storage medium applied to industrial firewall | |
Abdulrezzak et al. | Enhancing Intrusion Prevention in Snort System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210430 |
|
RJ01 | Rejection of invention patent application after publication |